Skip to main content

Advertisement

Log in

Secure and efficient data transmission by video steganography in medical imaging system

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Normally, steganography is used to increase the security during data transmission. While medial data transfer from one hospital to another hospital, video steganography in medical imaging system increases the security level. Steganography system mainly focuses and verifies the information confidentiality, integrity and authenticity. Steganography algorithm in medical imaging system mainly focused on other than the doctor diagnosis area because diagnosis area must not be affected. Based on this, this paper presents video steganography in medical imaging system to provide confidentiality, authenticity and integrity during medical data transfer. Motion attention index value and variation range is calculated from selected frame in a video and human vision region of interest is chosen based on motion attention index value and variation range. With respect to human vision region of interest, foreground and background object is detected in a video. Then face detection algorithm is applied to detect moving object in a video. Secret information is hiding in background object and, other than the face area of the foreground object. The experimental analysis shows that increases embedding capacity rate and decreases the detectable distortion.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Malde, P.R., Admuthe, L.S.: Data hiding in motion vectors of video. Int. J. Adv. Res. Comput. Commun. Eng. 2(11), 4207–4209 (2013)

    Google Scholar 

  2. Paulpandi, P., Meyyappan, T.: Hiding messages using motion vector technique in video steganography. Int. J. Eng. Trends Technol. 3(3), 361–365 (2012)

    Google Scholar 

  3. Balu, S., Barjana, L.P., Kavitha, T., Nithya, K.: Video steganographic system for secure and efficient data transmission. Int. J. Adv. Innov. Res. 6(3), 159–162 (2017)

    Google Scholar 

  4. Balu, S., Amudha, K., Nelson Kennedy Babu, C.: Human visual sensitivity guided bit embedding for video steganography. J. Comput. Sci. 9, 928–934 (2013)

    Google Scholar 

  5. Mostafa, S.A.K., Tolba, A.S., Abdelkader, F.M., Elhindy, H.M.: Video watermarking scheme based on principal component analysis and wavelet transform. Int. J. Comput. Sci. Netw. Secur. 9(8), 45–52 (2009)

    Google Scholar 

  6. Gupta, V., Sharma, D.: A study of various face detection methods. Int. J. Adv. Res. Comput. Commun. Eng. 3(5), 6694–6697 (2014)

    Google Scholar 

  7. Amudha, K., Nelson Kennedy Babu, C., Balu, S.: Hybrid baker map with AES in cipher block chaining mode in medical images. Int. Res. J. Pharm. 8(4), 67–73 (2016)

    Google Scholar 

  8. Amudha, K., Nelson Kennedy Babu, C., Balu, S.: Effectual reversible watermarking method for hide the patient details in brain tumor image. Int. J. Comput., Electr., Autom., Control Inf. Eng. 9(7), 1713–1717 (2016)

    Google Scholar 

  9. Kamal, Preet, Jindal, Gagandeep: Review of different steganographic techniques on medical images regarding their efficiency. Int. J. Innov. Eng. Technol. 2(2), 176–180 (2013)

    Google Scholar 

  10. Sumathi, C.P., Santanam, T., Umamaheswari, G.: A study of various steganographic techniques used for information hiding. Int. J. Comput. Sci. Eng. Surv. 4(6), 9–25 (2013)

    Google Scholar 

  11. Santhi, B., Dheeptha, B.: A novel edge based embedding in medical images based on unique key generated using sudoku puzzle design, pp. 1–16. Springer, Berlin (2016)

    Google Scholar 

  12. Pal, S., Bandyopadhyay, S.K.: A survey of analyzing data embedding technique in image staganography. Int. J. Latest Trends Eng. Technol. 7(2), 553–559 (2016)

    Google Scholar 

  13. Pandey, V., Shrivastava, M.: Medical image protection using steganography by crypto-image as cover image. Int. J. Adv. Comput. Res. 2(3), 45–48 (2012)

    Google Scholar 

  14. Razzaq, M.A., Baig, M.A., Shaikh, R.A., Memon, A.A.: Digital image security: fusion of encryption, steganography and watermarking. Int. J. Adv. Comput. Sci. Appl. 8(5), 224–228 (2017)

    Google Scholar 

  15. Atta, R., Ghanbari, M.: A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set. J. Vis. Commun. Image Represent. 53, 42–54 (2018)

    Google Scholar 

  16. Wu, H.-T., Tanga, S., Huang, J., Shic, Y.-Q.: A novel reversible data hiding method with image contrast enhancement. Signal Process. Image Commun. 62, 64–73 (2018)

    Google Scholar 

  17. Suresh, A., Varatharajan, R.: Competent resource provisioning and distribution techniques for cloud computing environment. Clust. Comput. (2017). https://doi.org/10.1007/s10586-017-1293-6

    Google Scholar 

  18. Chinnasamy, A., Sivakumar, B., Selvakumari, P., Suresh, A.: Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET. Clust. Comput. (2018). https://doi.org/10.1007/s10586-018-1760-8

    Google Scholar 

  19. Kannan, N., Sivasubramanian, S., Kaliappan, M., Vimal, S., Suresh, A.: Predictive big data analytic on demonetization data using support vector machine. Comput, Clust (2018). https://doi.org/10.1007/s10586-018-2384-8

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Balu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Balu, S., Babu, C.N.K. & Amudha, K. Secure and efficient data transmission by video steganography in medical imaging system. Cluster Comput 22 (Suppl 2), 4057–4063 (2019). https://doi.org/10.1007/s10586-018-2639-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2639-4

Keywords

Navigation